So, I'm terrible with any sort of coding, and I need help with generating a series of possible passwords. I've forgotten the combination of a password I put in for an email - I know the password, just ...

I was thinking about creating my own hash+salt function, something like sha1(password + md5(login)), then I read here (part 4) that creating it's own hash+salt function is a bad idea, because if the ...

I am 18 years old and i was searching for a way to hack passwords without a wordlist because it will take forever and may not work so i hope help .
(I will not use this to damage anyone but just for ...

Yahoo is trying to remove passwords from authentication and use on-demand password authentication system instead.
I wonder how this new system will be secure? Even if somebody steal your mobile can ...

For example I have this complex personal password cary1bondoc21cary2bondoc as my password and because I am forgetful I also want to used that in work related accounts like company email, etc. Is there ...

My Hotmail account was hacked, not so I couldn't use it, but I didn't know that it was being used. They got banking information and used it! I was overseas. My Hotmail account was opened by various IP ...

With arguments expressed in this answer, there is a few seconds delay between user enters an incorrect password and when he/she actually learns, that password was incorrect. This security solution is ...

I have heard from different people and in different places that if I send an encrypted file to someone else, I should send them the password in a separate email; but why? If someone is sniffing, they ...

I don't have passwords for my personal sites. To sign up a user pick their username and enter their email. There is a logout button if the user wishes to log out. To log in you enter your email and ...

I have recently been studying a lot on writing secure code and choosing secure methods for saving passwords to a database. I'm wondering if it's secure to use ready made libraries or APIs to do this ...

I have a Java-Server program running on Ubuntu-Server which gets every 5 minutes current location data of my android-smartphone (which I carry with me).
My architecture is the following:
My smartphone ...

YouTube is not available in my country, but I want to make an account at YouTube and use it. I'm not interested in protecting my identity. It is fine if anyone can monitor it. The thing I'm interested ...

TLDR: We already require two-factor authentication for some users. I'm hashing, salting, and doing things to encourage long passphrases. I'm not interested in the merits of password complexity rules ...

What is the cipher used by windows Credential Manager to generate credentials backup files (*.crd)?
With a backup file from Credential Manager and the password used to created that backup file is it ...

I want to know if I run OpenVPN when I want to log in to websites (like Gmail etc.....) is my username/password in danger? Can they monitor saved passwords in my browser or anything else?
I'm new to ...

The 'root'@'localhost' MySQL account can only be accessed by someone currently on the server hosting the MySQL server.
Assuming that only the person or persons who are in charge of the MySQL server ...

I have made some software that encrypts and decrypts files using AES. I was wondering if it is safe to write a hash of the password to the file so that the program can check if a password is correct. ...

Our organization is rolling out yearly password expiration to our 40,000+ users this fall and we have been socializing this change for some time now. However being such a large organization, our users ...

In many of the answers and comments on the well-known XKCD #936: Short complex password, or long dictionary passphrase? question, the importance was stressed of generating the password randomly, and ...

In an extra from Edward Snowden's interview with John Oliver, Snowdon advises that a good password to use is one such as MargaretThatcheris110%SEXY..
Also, on the Errata Security blog, Robert Graham ...

Website keep getting hacked every day and every now and then we hear website owners react and tell "affected users that their password might had been compromised". Most sites that disclose such leaks ...

Reading this topic How critical is it to keep your password length secret? following scenario comes to my mind:
Assume I've a web application (PHP written using password_hash()) using salted password ...

In the wake of all these leaked/stolen/hacked government login/passwords being stolen it got me thinking.
How is the leaking of these passwords even possible? Or are they of any real use?
Aren't all ...